Move Cyber Threats On To Another Target. Encrypt Everything, Everywhere. Imam Sheikh Director, Product Management Vormetric

Similar documents
2017 THALES DATA THREAT REPORT

2015 VORMETRIC INSIDER THREAT REPORT

Vormetric Data Security

2018 THALES DATA THREAT REPORT

Securing Your Most Sensitive Data

Best Practices in Securing a Multicloud World

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist

Vormetric Data Security

THALES DATA THREAT REPORT

10 Cloud Myths Demystified

2018 THALES DATA THREAT REPORT

Exam C Foundations of IBM Cloud Reference Architecture V5

Microsoft Security Management

SMARTCRYPT CONTENTS POLICY MANAGEMENT DISCOVERY CLASSIFICATION DATA PROTECTION REPORTING COMPANIES USE SMARTCRYPT TO. Where does Smartcrypt Work?

THALES DATA THREAT REPORT

VMware Hybrid Cloud Solution

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

Managing Your Privileged Identities: The Choke Point of Advanced Attacks

GLOBAL ENCRYPTION TRENDS STUDY

Welcome to the SafeNet Day! Prague 1st of October Insert Your Name Insert Your Title Insert Date

All the resources you need to get buy-in from your team and advocate for the tools you need.

Go mobile. Stay in control.

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

10 Cloud Myths Demystified

Who s Protecting Your Keys? August 2018

Encryption In The Enterprise

Zero Trust in Healthcare Centrify Corporations. All Rights Reserved.

Spotlight Report. Information Security. Presented by. Group Partner

Data Protection Everywhere. For the modern data center

Secure & Unified Identity

Mitigating Risks with Cloud Computing Dan Reis

Securing Digital Transformation

Windows Server The operating system

Google Identity Services for work

ADDRESSING PCI DSS 3.0 REQUIREMENTS WITH THE VORMETRIC DATA SECURITY PLATFORM

Cloud Customer Architecture for Securing Workloads on Cloud Services

Business Strategy Theatre

Securing Data in the Cloud: Point of View

Security Readiness Assessment

HP Fortify Software Security Center

The Latest EMC s announcements

SECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS

The Oracle Trust Fabric Securing the Cloud Journey

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Enabling Hybrid Cloud Transformation

Comprehensive Database Security

Channel FAQ: Smartcrypt Appliances

CompTIA Cloud Essentials Certification Exam Objectives EXAM NUMBER: CLO-001

CASE STUDY: USING THE HYBRID CLOUD TO INCREASE CORPORATE VALUE AND ADAPT TO COMPETITIVE WORLD TRENDS

Transforming IT: From Silos To Services

EMC Strategy Overview: Journey To The Private Cloud

Encryption Vision & Strategy

Cato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN

Are You Protected. Get Ahead of the Curve

The Etihad Journey to a Secure Cloud

Data Security and Privacy Principles IBM Cloud Services

ERP Solution to the Cloud

Data Protection Everywhere

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

Traditional Security Solutions Have Reached Their Limit

Identity & Access Management

Business today runs on technology. Modernize Your Datacenter. Challenges facing IT. Modernize Your Datacenter 10/17/ % Enterprise IT

NEXT GENERATION CLOUD SECURITY

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

Unstructured Data. Stored & Archived Data. Customers + Partners

Privacy and Security in the Age of Meaningful Use

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

Securing Data-at-Rest

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Private Clouds: Opportunity to Improve Data Security and Lower Costs. InfoTRAMS Fusion Tematyczny, Bazy Danych, Kariera I Prywatny Sprzęt t W Pracy

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Clouds in the Forecast. Factors to Consider for In-House vs. Cloud-Based Systems and Services

Business Technology Briefing: Fear of Flying, And How You Can Overcome It

Securing Your Cloud Introduction Presentation

Tokenisation: Reducing Data Security Risk

Acronis Hybrid Cloud Architecture Unified Centralized Data Protection Web-based User Interface Deployed On-premises or in the Cloud.

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

How unified backup and cloud enable your digital transformation success

Multi Packed Security Addressing Challenges in Cloud Computing

App Gateway Deployment Guide

Datasheet. Only Workspaces delivers the features users want and the control that IT needs.

the SWIFT Customer Security

VORMETRIC TRANSPARENT ENCRYPTION ARCHITECTURE

MEETING ISO STANDARDS

WHITEPAPER. Compliance with ITAR and Export Controls in Collaboration Systems

Cato Networks. Network Security as a Service

Transform your network and your customer experience. Introducing SD-WAN Concierge

LEAD YOUR CLOUD TRANSFORMATION. Copyright 2013 EMC Corporation. All rights reserved.

Oracle Secure Backup 12.2 What s New. Copyright 2018, Oracle and/or its affiliates. All rights reserved.

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

Enterprise Mobility + Security

I D C T E C H N O L O G Y S P O T L I G H T. SD- W AN : M o m e n t u m B u i l d s as Early Ad o p t e r s

Citrix Workspace Cloud

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

THE FIVE DEADLY SINS OF PRIVILEGED ACCESS MANAGEMENT

Teradata and Protegrity High-Value Protection for High-Value Data

Transform your network and your customer experience. Introducing SD-WAN Concierge

OWASP CISO Survey Report 2015 Tactical Insights for Managers

Temenos Bringing banking to millions through Cloud Scale Innovation

Transcription:

Move Cyber Threats On To Another Target Encrypt Everything, Everywhere Imam Sheikh Director, Product Management Vormetric

State of the Market

Evolving Threats Today s spectrum of Insider Threats TRADITIONAL INSIDERS PRIVILEGED USERS HACKERS ACTIVELY TARGETING INSIDER ACCOUNTS CRIMINAL HACKERS CLOUD/SAAS NATION STATES BIG DATA POROUS PERIMETERS IN THE PAST COMPANY EMPLOYEES WITH KNOWLEDGE-REQUIRED ACCESS TODAY WE MUST ADD IT PERSONNEL, CONTRACTORS SERVICE PROVIDER EMPLOYEES COMPROMISE OF INSIDER ACCOUNTS BY OUTSIDERS (ISC) 2 e-symposium 3

Failing to Secure Their Data GLOBAL- 40% X ASEAN United States UK Japan 48% 44% 40% 29% 26% EXPERIENCED A DATA BREACH OR FAILED A COMPLIANCE AUDIT Germany GLOBAL- 29% ASEAN United States UK Germany Japan 38% 33% 27% 25% 7% ARE PROTECTING DATA BECAUSE OF A PARTNER OR COMPETITOR S BREACH (ISC) 2 e-symposium 4

Targets of Sensitive Data Acquisition Hackers target where the data resides DATABASES FILE SERVERS CLOUD 49% 39% 36% (ISC) 2 e-symposium 5

Industry and Security Experts Alike: Encrypt Everything (ISC) 2 e-symposium 6

Sensitive Data Protection Technologies Data in Motion Data at Rest SSL, SSH, HTTPS, IPSEC ENCRYPTION, TOKENIZATION, MASKING (ISC) 2 e-symposium 7

Practical Encrypt Everything

Where is Sensitive Data? If you re not sure You are at risk Remote? On Servers? On Different Environments? On Varying Storage? App Servers Database Servers Enterprise / Hosted / Outsourced Data Centers NAS Users Storage Servers Web Servers SaaS, PaaS, IaaS Clouds SAN Remote Servers Windows Linux Unix Cloud Storage Big Data Environments (ISC) 2 e-symposium 9

Good News Widening adoption of encryption 35% 15% Feb 2014 (ISC) 2 e-symposium 10

Bad News A disjointed, expensive collection of point products Expense Reports Customer Records PII Compliance Cloud Migration Physical Security Tape Archives Privileged User Control File Encryption Database Encryption App Encryption Cloud Encryption Full Disk Encryption Key Management Access Policies + + + + + + Each use case requires individual infrastructure, management consoles and training. Complex Inefficient - Expensive (ISC) 2 e-symposium 11

No Magic Bullet (ISC) 2 e-symposium 12

The Encrypt Everything Three Step Program 1. Set Vision Statement 2. Develop Policy 3. Develop Implementation Strategy (ISC) 2 e-symposium 13

Set Vision Statement Protect all sensitive data to keep my organization out of the data breach news section. (ISC) 2 e-symposium 14

Develop Policy Analyze & State your corporate, organizational and security requirements/needs Analyze & State the drivers for your strategy Understand the security and compliance requirements from business units Classify sensitive data further (ISC) 2 e-symposium 15

Develop Implementation Strategy Recommended by Ovum Concentrate on protecting data at the source Make encryption with access controls the default Monitor and analyze data access patterns Replace point solutions with data security platforms (ISC) 2 e-symposium 16

Realizing the Vision Within Budget

Types Of Encryption App Level Encryption, Tokenization, TDE, Data Masking File Encryption with access control Disk Encryption (FDE) (ISC) 2 e-symposium 18

Databases & Big Data Considerations Data sources/nodes, Configuration, Logs, Reports, Targets (ISC) 2 e-symposium 19

File Servers Considerations User: AccountsPayable App: ERP What: Read File Time: 2PM 11/14/2013 Where: ERP Directory User: SystemAdmin- Group Process: Cat command What: Read File Time: 2PM 11/14/2013 Where: HR ERP Directory File Level Encryption Block access and log attempt Data Auditing Separation of duties Accounts HR ERP Payable Directory Directory Access Policy #1 User: AccountsPayable App: ERP Opp: Read Only Time: Any Resources: Any (ISC) 2 e-symposium 20

Cloud Considerations Secure VPN Key Manager (virtual or physical appliances) Deployed on premise Key Manager (virtual or hosted physical appliances) Deployed in cloud Key management: Appliance on premise Virtual appliance on premise Virtual Key Management appliance in cloud Appliance hosted by provider Auditing Hybrid Cloud (ISC) 2 e-symposium 21

Vormetric Data Security Platform Ready for the next use case (ISC) 2 e-symposium 22

Vormetric Data Security Platform Enabling an Encrypt Everything strategy (ISC) 2 e-symposium 23

Example Use Cases

McKesson Healthcare Company Challenge Action Result Had to meet many compliance requirements Business Groups deploying many encryption solutions Level of solution quality varied Very expensive Vormetric Data Security Platform Leveraged multidomain management Available enterprisewide Higher availability Consistency Significant TCO reduction (ISC) 2 e-symposium 25

Fortune 100 Finance Company Challenge Faced with a customer mandate, traditional encryption approaches were sized at a 24 month engineering effort Action Vendor bake-off Deployed Vormetric Transparent Encryption Result Protected 160 servers in less than 3 months Have easily expanded solution to meet many more use cases (ISC) 2 e-symposium 26

Questions www.vormetric.com